Preview

Sextortion

Better Essays
Open Document
Open Document
1706 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Sextortion
Facebook Sextortion

Sextortion is the latest cybercrime used against children—it a form of sexual exploration one uses guilt, power, or knowledge of certain secrets, to force another person into having sex or performing sexual favors. “Christopher Patrick Gunn was indicted Thursday by a federal grand jury in Montgomery with two counts of production of child pornography, three counts of interstate extortion, and three counts of using a facility of interstate commerce in furtherance of unlawful activity” (Shyyock, 2012). If convicted he could spend up to 100 years in the federal prison and $500,000 in fines with a lifetime supervised release. Christopher Patrick Gunn was using facebook (social networking site) to extort young girls. He would create phony profiles on facebook then he would send out facebook request to the young girls. Profiles that he used consisted of “The Justin Bieber Ruse” (when using Justin’s profile Gunn would promise the girls concert tickets), “The New Kid Ruse,” “Daniel Rodgers,” Dalton Walthers.” “Tyler Mielke” and “Jason Lempke.” Once the young girls would accept his friend request they were able to use an internet-base interactive video chat service—like SKYPE.
He would gain their trust so then he would proceed to ask personal questions (bra size, sexual status, etc) once he gathered enough information Gunn would request topless photos. If the girls refused he threatened to divulge the intimate conversations to the principle or place it on Facebook for the public to hear. In order for the prosecution to successfully prosecute Christopher Patrick Gunn the investigation that began in April 2011 after complaints were made from female students at Prattville Junior High School that they were receiving inappropriate picture solicitation request from a Facebook profile, police, crime scene investigators and criminalist have to provide strong evidence about the committed crime. As a result of the complaint filed pertaining to child



References: Buckles, T. (2007). Crime scene investigation, criminalistics, and the law. Cilfton Park, NY: Delmar, Cengage Learning. Press, E.C. (2010). Computer forensics investigating network intrusions and cybercrime:ec-council|press. Cilfton Park, NY: Course Technology Cengage Learning. Shyyock, J. (2012, April 26). New charges in global facebook sextortion case. Retrieved from http://www.wsfa.com/story/17796152/new-charges-in-global-facebook-sextortion-case Weissman, R. W. (2012, May 03). Man usde facebook profiles to trick teenage girls. Retrieved from http://weissmanreport.com/news/item/2132-man-used-fake-facebook-profiles-to-trick-teenage-girls

You May Also Find These Documents Helpful

  • Powerful Essays

    Pam Fodrill Case Study

    • 1890 Words
    • 8 Pages

    The popular television show, CSI: Crime Scene Investigations has been on the air for 12 years, and it has brought forth the behind-the-scenes actions of criminal investigations, even if its portrayals are not always scientifically accurate. This has caused an interest in the forensic sciences that has led most people to a skewed view of how a criminal investigation actually works. The reality of a criminal investigation is that it is generally more tedious and difficult than the theory of criminal investigation would have you believe. By examining the forensic and investigative procedures of the case of Pamela Foddrill, it is apparent that the theory of criminal investigation was not representative of the procedures concerning examination of the body, but that it was demonstrative of much of the investigatory steps taken by police, like search warrants. On August 18th, 1995, 44-year-old Pamela Foddrill disappeared from the town of Linton, Indiana. Pamela went to buy some groceries at the local IGA and was abducted: her body was found wrapped in a sleeping bag near Russellville, Illinois four months later. Roughly four years later, five individuals were held responsible for their part in the abduction, rape, and murder of Pamela Foddrill: Roger Long, John Redman, Jerry Russell Sr., Wanda Hubbell, and Plynia Fowler. Long, Redman, and Russell are serving life sentences, while Fowler pled out to 14 years and Hubbell pled out to 20 years of incarceration.…

    • 1890 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    A man by the name of Brian K. Hendrix was just sentenced to twenty one years in prison for his role in an international child exploitation ring, revolving around getting underage girls to perform sexual acts on a webcam. He would use fake profiles on different social media websites to convince underage girls, some as young as eight, that he was also a young girl. He would then play a video of another victim of his performing sexual acts in front of the camera, convincing the new victim to do the same and record it for his child pornography website. The department that built the case is known as the FBI’s Violent Crimes Against Children Section (VCACS). A total of eight other co-conspirators where arrested and sentenced as a part of the operation, from New York to South Africa. This particular case is a fantastic example of the FBI working with other federal agencies and even other nation’s police forces. I counted over a dozen agencies that assisted in making these arrests, involving the Royal Canadian Mounted Police and South African…

    • 556 Words
    • 3 Pages
    Good Essays
  • Good Essays

    One is the victims, the other has links to an address in California, and the last is from Poland and was never able to connect with the victims address. With an Ex-parte order, Trooper Aresco receives a response from Facebook with history logs as to what IP addresses are relating to the victims. Again, there is a link to the physical address in Sacramento. Trooper Aresco then receives information from Comcast to the address in Sacramento and the IP address is a match. Officer Lockhart receives a search warrant and confiscates a computer from Bronk's bedroom desk. The labeling of a computer is complete with a number two for identification purposes. A forensic examination uncovers pictures of the victim in the file C:\Documents and Settings\Geeg\Desktop\nextfomav\aalechnowicz."nextfornav" folder. The folder also holds the 172 folders of other email accounts Bronk can access and hack. Upon more searching, Lockhart discovers a "pass.txt" file that contains more information on the victims. Lockhart uncovers a file that contains child pornography picture and videos and documents his findings (Shinder, 2010). These acts are in violation of Penal Code sections 502(c) (1) (computer access and fraud); 529 (impersonation of another person); 520 (extortion) and 311.11(a) (possession of child…

    • 664 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The investigation of rape and other sex crimes represents a significant challenge for the criminal investigator. The manner in which the investigation is conducted can have an impact not only on a successful conclusion in court, but also on the psychological and social well-being of the victim. Sex crimes, more so than many other forms of criminal activity, are likely to leave an emotional scar that can last a lifetime. (Osterburg, J. 2014).…

    • 308 Words
    • 1 Page
    Good Essays
  • Good Essays

    Connell, Catherine S., and Martha J. Finnegan. “Interviewing complaint adolescent victims.” The FBI Law Enforcement Bulletin 79.5 (2010): 16+. General OneFile. Web. 22 August 2010.…

    • 1379 Words
    • 6 Pages
    Good Essays
  • Good Essays

    John Smith Research Paper

    • 405 Words
    • 2 Pages

    The Huffington Post reports that some people tend to lie on social media to boost their self esteem or to portray themselves of who they’d like to be. One may assume that Smith is attempting to boost his self esteem or portray himself differently, because he is completely different from what his profile suggests. The only truths are that he’s in high school and that he plays baseball. If someone were to see John Smith strolling through Wal-Mart, his pants are on his waist, most likely with a belt! Also, Smith’s constantly charming, maintains perfect manners, and doesn’t curse every other sentence like his profile may suggest. Plus, Smith is not affiliated with any gangs, despite of the pictures he posts on Facebook and is also on the honor roll at his high school. John Smith is the perfect case of someone who portrays themselves differently online. Just like the Huffington Post explain, John Smith is portraying himself differently online to help himself. Smith uses his statuses and photos to make people perceive him as someone he will never be. Even though, John Smith is probably only portraying himself differently to boost his self-esteem, he is actually tricking and confusing his friends on social media. Now-a-days, one can definitely not trust everything they see…

    • 405 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The world of online dating have had their share of negatives. These cons include cyber bullying, being “Catfished,”and also the occurrences of pedophiles/sex offenders. According to M.T.V, fifty-seven episodes of “Catfished” has aired since 2012, their host, Nev Schulman, states “hundreds of cases go unnoticed every day.” Social networks have an influence on people that include being involved in identity thief, cyber bullying, as well online predators.…

    • 1076 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Dysfunctional Ever After

    • 1276 Words
    • 6 Pages

    Some women strive for attention, and would pay any price to get it, but not all attention seekers do so because of personality disorders. Most sacrifice some of their personal values for the sake of attention. Therefore this usually is the result of an underlying disorder. Ariel Schulman, Henry Joost, and Yaniv Schulman, Ariel's brother, are the filmmakers that created Catfish, a documentary showing how even a seemingly normal, but troubled housewife who spent the majority of her days caring for two severely handicapped stepsons all the while creating an elaborate web of online deception until reality came crashing in (2010). In author Helen Shulman's short story, "Parents' Night," she gives readers a detailed glimpse of how far a married woman will go to seek the desired attention she craves from her not yet divorced previous husband (2008). Do they do it for the thrill, the need or are they seeking this additional attention for greater reasons? The film Catfish and the short novel, “Parents’ Night, both displayed abnormal behaviors of two seemingly normal married women.…

    • 1276 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Identity Crisis Theory

    • 833 Words
    • 4 Pages

    In social media, people can easily find videos and images that promotes “sexual addictive behavior.” These free sexual images and videos can lead to teens taking the next step on clicking the internet sites that gives “sex chat, sexual hook-ups, prostitutes, or finding old acting-out partners” (Hatch). Paulla Hall, a sex addiction therapist, claims about forty percent of teenagers had seen pornography before age of twelfth. For men, excitement was the reason for their sexual behavior. In women, “affirmation and feeling wanted” was their reason. Because teenagers lack of education and easy access to porn, it can easily lead them to become addicted. Keir Starmer, the Director of Public Prosecutions, admits internet pornography have increased violence in teenage relationships over the year…

    • 833 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The Internet has taken a number of society’s problems and vices, and exacerbated them. This paper will touch upon one of those vices, the sexual solicitation of children. The Internet has provided convicted sex offenders with virtually unfettered access to society’s most vulnerable victims. No longer are convicted sex offenders relegated to stalking their victims at places that youths tend to physically congregate, such as the local malls and movie theatres; they now have the advantage of preying on their victims in relative anonymity from the comfort of their own homes. At the click of a mouse they can access networks of millions of unsuspecting children. They stalk their victims with methodic…

    • 4547 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The field of Criminal Justice has so many different career paths that anyone can succeed in and it’s for that reason I have picked the Forensic Science path to explore. There are a number of reasons why I have chosen to explore and get an education in this career. The specialization of Forensic Science within the Criminal Justice is right for me because I feel that families should have closure, I feel that people who don’t deserve to be in prison should have a fair trial, I like watching crime shows all the time, and last but not least it’s a more challenging field of work and I love challenges.…

    • 924 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Internet Predators

    • 4491 Words
    • 18 Pages

    One in four US teen girls reported that they met strangers off the Internet. One in seven boys admitted they did as well. While most of these "Internet friends" turn out to be another teen or preteen, that 's not always the case. Unfortunately, children are now dying at the hands of their Internet child molesters and, not all sexual exploitation of children occurs offline.…

    • 4491 Words
    • 18 Pages
    Good Essays
  • Good Essays

    In 2000, the Arlington Police Department received information stating that Earnest Leon Voyles had exchanged emails that contained sexual content with a fifteen year old girl from London, England. According to this informant the fifteen year old girl, “Amy Chang”, had been solicited for sex by Voyles and had arranged to meet with her in London to engage in a sexual relationship. Sergeant James Crouch of the Arlington Police Department was unsuccessful in contacting “Amy Chang” to verify the arrangement but was not successful, however, he was successful in verifying that Voyles was working as a teacher at a junior high located in Arlington, Texas.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ashley Madison is a well-known Canadian website that serves as both a social networking site and a dating service. Founded in 2002, it is a company that heavily markets to people who are married or in a relationship and still want to date. Throughout the years it has become one of the most controversial websites that had ignited many discussions on what’s ethical and what’s not. Even after receiving massive attention due to hackers obtaining personal data of current users, Ashley Madison continues its operations of providing nearly forty million users with its services. Although many people would argue what is wrong with the site, many others had made counter arguments…

    • 953 Words
    • 4 Pages
    Good Essays